Osprey

The Osprey hardware platform was designed and developed during 2012 and early 2013 by Stephen A. Ridley. Osprey is the basis for a consumer product called Tally (patent pending) which is currently in development. The Osprey hardware platform is dual use however. With modified firmware, Stephen has been using the Osprey hardware (as a consultant) to facilitate attacks against embedded systems and low-power RF networks. The goal is for it to be the "Metasploit" of hardware hacking. Modular with a firmware framework. (i.e. BusPirate functionality, glitching, JTAG brute forcing, low-power RF network attacks, etc.)

Osprey is not for sale yet. The cost per-unit is still quite high due to the complexity of a multi-layer RF board like this. There are less that 20 Ospreys in existence. They are currently used for Tally development; to facilitate hardware attacks during consulting engagements, and have been released to private clients/customers.

Manufacturing electronics is entirely about volume. The more you can manufacture, the cheaper per-unit. The goal is that with the larger production volumes for the release of the consumer product (Tally) researchers will be able to repurpose the cheaper consumer hardware with custom firmware loads and use Osprey to facilitate their own hardware vulnerability research tasks.

Many people skip the INT3 "About" page and formulate opinions without understanding what is going on here. Please read that to understand why just because a project is "Open Source hardware" doesn't mean...

The blog system on this e-commerce platform is awful. This blogpost has been prettified and moved to Xipiter's main blog here:
http://www.xipiter.com/musings/using-the-shikra-to-attack-embedded-systems-getting-started